You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/source/DeveloperGuide/OAuth2Authorization/index.rst
+12-4Lines changed: 12 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -141,7 +141,7 @@ Also added the ability to authorize without a certificate while configuring the
141
141
Authorization API
142
142
=================
143
143
144
-
With a new system component - :ref:`APIs <apis>`, was created Authorization API for *Framework* system (see :py:class:`~DIRAC.FrameworkSystem.API.AuthHandler`) which provides the necessary endpoints for interaction with DIRAC AS.
144
+
With a new system component - :ref:`APIs <apis>`, was created Authorization API for *Framework* system (see :py:class:`~DIRAC.FrameworkSystem.API.AuthHandler`) which provides the necessary endpoints for interaction with DIRAC AS.
145
145
146
146
147
147
Token Manager
@@ -154,7 +154,7 @@ Identity Provider
154
154
=================
155
155
156
156
Since DIRAC is not going to perform the function of user account management, it delegates this function as much as possible to third parties services where VOs should be registered and where there are VO administrators who will deal with it.
157
-
Such resources are described as `IdProviders`, see :ref: `idps`.
157
+
Such resources are described as `IdProviders`, see :ref:`resourcesIdProvider`.
1) The user selects an identity provider for authorization in the web portal.
246
+
#) After receiving this request from the browser, the web server creates an authorization session, and redirects the user to DIRAC AS by initiating the **OAuth 2.0 Authorization Code flow**.
247
+
#) DIRAC AS will initialize **OAuth 2.0 Authorization Code flow** with choosed IdP.
248
+
#) When the user has successfully logged in, DIRAC AS redirects him back to the web server with an authorization code.
249
+
#) Web server sends this code to the DIRAC AS along with the client credentials and recieve an access and refresh tokens.
250
+
#) The web server creates an http only secure cookie with the received tokens and store an access token in sessionStorage (see https://www.w3schools.com/jsref/prop_win_sessionstorage.asp for more details). This token can be used by JS code from the user's browser (currently not used).
251
+
252
+
This scheme is being revised to simplify it.
245
253
246
254
***********
247
255
Logging out
@@ -274,4 +282,4 @@ Click on the username to select "Log out".
The web server receives a request from the user's browser to end the session and made revoke refresh token request to DIRAC AS. After that cleans cookies.
0 commit comments